957 resultados para ARM Linux
Resumo:
Continuous infusion (CI) ticarcillin–clavulanate is a potential therapeutic improvement over conventional intermittent dosing because the major pharmacodynamic (PD) predictor of efficacy of β-lactams is the time that free drug levels exceed the MIC. This study incorporated a 6-year retrospective arm evaluating efficacy and safety of CI ticarcillin–clavulanate in the home treatment of serious infections and a prospective arm additionally evaluating pharmacokinetics (PK) and PD. In the prospective arm, steady-state serum ticarcillin and clavulanate levels and MIC testing of significant pathogens were performed. One hundred and twelve patients (median age, 56 years) were treated with a CI dose of 9.3–12.4 g/day and mean CI duration of 18.0 days. Infections treated included osteomyelitis (50 patients), septic arthritis (6), cellulitis (17), pulmonary infections (12), febrile neutropenia (7), vascular infections (7), intra-abdominal infections (2), and Gram-negative endocarditis (2); 91/112 (81%) of patients were cured, 14 (13%) had partial response and 7 (6%) failed therapy. Nine patients had PICC line complications and five patients had drug adverse events. Eighteen patients had prospective PK/PD assessment although only four patients had sufficient data for a full PK/PD evaluation (both serum steady-state drug levels and ticarcillin and clavulanate MICs from a bacteriological isolate), as this was difficult to obtain in home-based patients, particularly as serum clavulanate levels were found to deteriorate rapidly on storage. Three of four patients with matched PK/PD assessment had free drug levels exceeding the MIC of the pathogen. Home CI of ticarcillin–clavulanate is a safe, effective, convenient and practical therapy and is a therapeutic advance over traditional intermittent dosing when used in the home setting.
Resumo:
Previous work has shown that amplitude and direction are two independently controlled parameters of aimed arm movements, and performance, therefore, suffers when they must be decomposed into Cartesian coordinates. We now compare decomposition into different coordinate systems. Subjects pointed at visual targets in 2-D with a cursor, using a two-axis joystick or two single-axis joysticks. In the latter case, joystick axes were aligned with the subjects’ body axes, were rotated by –45°, or were oblique (i.e., one axis was in an egocentric frame and the other was rotated by –45°). Cursor direction always corresponded to joystick direction. We found that compared with the two-axis joystick, responses with single-axis joysticks were slower and less accurate when the axes were oriented egocentrically; the deficit was even more pronounced when the axes were rotated and was most pronounced when they were oblique. This confirms that decomposition of motor commands is computationally demanding and documents that this demand is lowest for egocentric, higher for rotated, and highest for oblique coordinates. We conclude that most current vehicles use computationally demanding man–machine interfaces.
Resumo:
Purpose: The purpose of this paper is to gain a better understanding of the types of relationships that exist along the supply chain and the capabilities that are needed to manage them effectively. ---------- Design/methodology/approach: This is exploratory research as there has been little empirical research into this area. Quantitative data were gathered by using a self-administered questionnaire, using the Australian road freight industry as the context. There were 132 usable responses. Inferential and descriptive analysis, including factor analysis, confirmatory factor and regression analysis was used to examine the predictive power of relational factors in inter-firm relationships. ---------- Findings: Three factors were identified as having significant influence on relationships: sharing, power and interdependency. “Sharing” is the willingness of the organisation to share resources with other members of the supply chain. “Power” relates to exercising control based on experience, knowledge and position in the supply chain. “Interdependency” is the relative levels of dependency along the supply chain. ---------- Research limitations/implications: The research only looks at the Australian road freight industry; a wider sample including other industries would help to strengthen the generalisability of the findings. ---------- Practical implications: When these factors are correlated to the types of relationship, arm's length, cooperation, collaboration and alliances, managerial implications can be identified. The more road freight businesses place importance on power, the less they will cooperate. The greater the importance of sharing and interdependency, the greater is the likelihood of arm's length relationships. ---------- Originality/value: This paper makes a contribution by describing empirical work conducted in an under-researched but important area – supply chain relationships in the Australian road freight industry.
Resumo:
Introduction Ovine models are widely used in orthopaedic research. To better understand the impact of orthopaedic procedures computer simulations are necessary. 3D finite element (FE) models of bones allow implant designs to be investigated mechanically, thereby reducing mechanical testing. Hypothesis We present the development and validation of an ovine tibia FE model for use in the analysis of tibia fracture fixation plates. Material & Methods Mechanical testing of the tibia consisted of an offset 3-pt bend test with three repetitions of loading to 350N and return to 50N. Tri-axial stacked strain gauges were applied to the anterior and posterior surfaces of the bone and two rigid bodies – consisting of eight infrared active markers, were attached to the ends of the tibia. Positional measurements were taken with a FARO arm 3D digitiser. The FE model was constructed with both geometry and material properties derived from CT images of the bone. The elasticity-density relationship used for material property determination was validated separately using mechanical testing. This model was then transformed to the same coordinate system as the in vitro mechanical test and loads applied. Results Comparison between the mechanical testing and the FE model showed good correlation in surface strains (difference: anterior 2.3%, posterior 3.2%). Discussion & Conclusion This method of model creation provides a simple method for generating subject specific FE models from CT scans. The use of the CT data set for both the geometry and the material properties ensures a more accurate representation of the specific bone. This is reflected in the similarity of the surface strain results.
Resumo:
Home Automation (HA) has emerged as a prominent ¯eld for researchers and in- vestors confronting the challenge of penetrating the average home user market with products and services emerging from technology based vision. In spite of many technology contri- butions, there is a latent demand for a®ordable and pragmatic assistive technologies for pro-active handling of complex lifestyle related problems faced by home users. This study has pioneered to develop an Initial Technology Roadmap for HA (ITRHA) that formulates a need based vision of 10-15 years, identifying market, product and technology investment opportunities, focusing on those aspects of HA contributing to e±cient management of home and personal life. The concept of Family Life Cycle is developed to understand the temporal needs of family. In order to formally describe a coherent set of family processes, their relationships, and interaction with external elements, a reference model named Fam- ily System is established that identi¯es External Entities, 7 major Family Processes, and 7 subsystems-Finance, Meals, Health, Education, Career, Housing, and Socialisation. Anal- ysis of these subsystems reveals Soft, Hard and Hybrid processes. Rectifying the lack of formal methods for eliciting future user requirements and reassessing evolving market needs, this study has developed a novel method called Requirement Elicitation of Future Users by Systems Scenario (REFUSS), integrating process modelling, and scenario technique within the framework of roadmapping. The REFUSS is used to systematically derive process au- tomation needs relating the process knowledge to future user characteristics identi¯ed from scenarios created to visualise di®erent futures with richly detailed information on lifestyle trends thus enabling learning about the future requirements. Revealing an addressable market size estimate of billions of dollars per annum this research has developed innovative ideas on software based products including Document Management Systems facilitating automated collection, easy retrieval of all documents, In- formation Management System automating information services and Ubiquitous Intelligent System empowering the highly mobile home users with ambient intelligence. Other product ideas include robotic devices of versatile Kitchen Hand and Cleaner Arm that can be time saving. Materialisation of these products require technology investment initiating further research in areas of data extraction, and information integration as well as manipulation and perception, sensor actuator system, tactile sensing, odour detection, and robotic controller. This study recommends new policies on electronic data delivery from service providers as well as new standards on XML based document structure and format.
Resumo:
This research used the Queensland Police Service, Australia, as a major case study. Information on principles, techniques and processes used, and the reason for the recording, storing and release of audit information for evidentiary purposes is reported. It is shown that Law Enforcement Agencies have a two-fold interest in, and legal obligation pertaining to, audit trails. The first interest relates to the situation where audit trails are actually used by criminals in the commission of crime and the second to where audit trails are generated by the information systems used by the police themselves in support of the recording and investigation of crime. Eleven court cases involving Queensland Police Service audit trails used in evidence in Queensland courts were selected for further analysis. It is shown that, of the cases studied, none of the evidence presented was rejected or seriously challenged from a technical perspective. These results were further analysed and related to normal requirements for trusted maintenance of audit trail information in sensitive environments with discussion on the ability and/or willingness of courts to fully challenge, assess or value audit evidence presented. Managerial and technical frameworks for firstly what is considered as an environment where a computer system may be considered to be operating “properly” and, secondly, what aspects of education, training, qualifications, expertise and the like may be considered as appropriate for persons responsible within that environment, are both proposed. Analysis was undertaken to determine if audit and control of information in a high security environment, such as law enforcement, could be judged as having improved, or not, in the transition from manual to electronic processes. Information collection, control of processing and audit in manual processes used by the Queensland Police Service, Australia, in the period 1940 to 1980 was assessed against current electronic systems essentially introduced to policing in the decades of the 1980s and 1990s. Results show that electronic systems do provide for faster communications with centrally controlled and updated information readily available for use by large numbers of users who are connected across significant geographical locations. However, it is clearly evident that the price paid for this is a lack of ability and/or reluctance to provide improved audit and control processes. To compare the information systems audit and control arrangements of the Queensland Police Service with other government departments or agencies, an Australia wide survey was conducted. Results of the survey were contrasted with the particular results of a survey, conducted by the Australian Commonwealth Privacy Commission four years previous, to this survey which showed that security in relation to the recording of activity against access to information held on Australian government computer systems has been poor and a cause for concern. However, within this four year period there is evidence to suggest that government organisations are increasingly more inclined to generate audit trails. An attack on the overall security of audit trails in computer operating systems was initiated to further investigate findings reported in relation to the government systems survey. The survey showed that information systems audit trails in Microsoft Corporation's “Windows” operating system environments are relied on quite heavily. An audit of the security for audit trails generated, stored and managed in the Microsoft “Windows 2000” operating system environment was undertaken and compared and contrasted with similar such audit trail schemes in the “UNIX” and “Linux” operating systems. Strength of passwords and exploitation of any security problems in access control were targeted using software tools that are freely available in the public domain. Results showed that such security for the “Windows 2000” system is seriously flawed and the integrity of audit trails stored within these environments cannot be relied upon. An attempt to produce a framework and set of guidelines for use by expert witnesses in the information technology (IT) profession is proposed. This is achieved by examining the current rules and guidelines related to the provision of expert evidence in a court environment, by analysing the rationale for the separation of distinct disciplines and corresponding bodies of knowledge used by the Medical Profession and Forensic Science and then by analysing the bodies of knowledge within the discipline of IT itself. It is demonstrated that the accepted processes and procedures relevant to expert witnessing in a court environment are transferable to the IT sector. However, unlike some discipline areas, this analysis has clearly identified two distinct aspects of the matter which appear particularly relevant to IT. These two areas are; expertise gained through the application of IT to information needs in a particular public or private enterprise; and expertise gained through accepted and verifiable education, training and experience in fundamental IT products and system.
Resumo:
Background: Impairments in upper-body function (UBF) are common following breast cancer. However, the relationship between arm morbidity and quality of life (QoL) remains unclear. This investigation uses longitudinal data to describe UBF in a population-based sample of women with breast cancer and examines its relationship with QoL. ---------- Methods: Australian women (n = 287) with unilateral breast cancer were assessed at three-monthly intervals, from six- to 18-months post-surgery (PS). Strength, endurance and flexibility were used to assess objective UBF, while the Disability of the Arm, Shoulder and Hand questionnaire and the Functional Assessment of Cancer Therapy- Breast questionnaire were used to assess self-reported UBF and QoL, respectively. ---------- Results: Although mean UBF improved over time, up to 41% of women revealed declines in UBF between sixand 18-months PS. Older age, lower socioeconomic position, treatment on the dominant side, mastectomy, more extensive lymph node removal and having lymphoedema each increased odds of declines in UBF by at least twofold (p < 0.05). Lower baseline and declines in perceived UBF between six- and 18-months PS were each associated with poorer QoL at 18-months PS (p < 0.05). ---------- Conclusions: Significant upper-body morbidity is experienced by many following breast cancer treatment, persisting longer term, and adversely influencing the QoL of breast cancer survivors.
Resumo:
This investigation describes the prevalence of upper-body symptoms in a population-based sample of women with breast cancer (BC) and examines their relationships with upper-body function (UBF) and lymphoedema, as two clinically important sequelae. Australian women (n=287) with unilateral BC were assessed at three-monthly intervals, from six to 18 months post-surgery (PS). Participants reported the presence and intensity of upper-body symptoms on the treated side. Objective and self-reported UBF and lymphoedema (bioimpedance spectroscopy) were also assessed. Approximately 50% of women reported at least one moderate-to-extreme symptom at 6- and at 18-months PS. There was a significant relationship between symptoms and function (p<0.01), whereby perceived and objective function declined with increasing number of symptoms present. Those with lymphoedema were more likely to report multiple symptoms and presence of symptoms at baseline increased risk of lymphoedema (ORs>1.3, p=0.02). Although, presence of symptoms explained only 5.5% of the variation in the odds of lymphoedema. Upper-body symptoms are common and persistent following breast cancer and are associated with clinical ramifications, including reduced UBF and increased risk of developing lymphoedema. However, using the presence of symptoms as a diagnostic indicator of lymphoedema is limited.
Resumo:
PURPOSE: To determine if participants with normal visual acuity, no ophthalmoscopically signs of age-related maculopathy (ARM) in both eyes and who are carriers of the CFH, LOC387715 and HRTA1 high-risk genotypes (“gene-positive”) have impaired rod- and cone-mediated mesopic visual function compared to persons who do not carry the risk genotypes (“gene-negative”).---------- METHODS: Fifty-three Caucasian study participants (mean 55.8 ± 6.1) were genotyped for CFH, LOC387715/ARMS2 and HRTA1 polymorphisms. We genotyped single nucleotide polymorphisms (SNPs) in the CFH (rs380390), LOC387715/ARMS2 (rs10490924) and HTRA1 (rs11200638) genes using Applied Biosystems optimised TaqMan assays. We determined the critical fusion frequency (CFF) mediated by cones alone (Long, Middle and Short wavelength sensitive cones; LMS) and by the combined activities of cones and rods (LMSR). The stimuli were generated using a 4-primary photostimulator that provides independent control of the photoreceptor excitation under mesopic light levels. Visual function was further assessed using standard clinical tests, flicker perimetry and microperimetry.---------- RESULTS: The mesopic CFF mediated by rods and cones (LMSR) was significantly reduced in gene-positive compared to gene-negative participants after correction for age (p=0.03). Cone-mediated CFF (LMS) was not significantly different between gene-positive and -negative participants. There were no significant associations between flicker perimetry and microperimetry and genotype.---------- CONCLUSIONS: This is the first study to relate ARM risk genotypes with mesopic visual function in clinically normal persons. These preliminary results could become of clinical importance as mesopic vision may be used to document sub-clinical retinal changes in persons with risk genotypes and to determine whether those persons progress into manifest disease.
Resumo:
Introduction: Excessive exposure to ultraviolet (UV) radiation from sunlight is a causative factor in the development of skin damage and skin cancer. Little research has been undertaken into assessing the sun exposure linking to skin damage inside buildings or behind window glass. This project directly addressed this issue by aiming to assess the role that UV exposure has on skin damage for indoor workers and drivers. Methods: Measurements of personal UV exposure using UV sensitive polymer dosimeters were undertaken of 41 indoor workers and 3 professional drivers. Physical measurements of skin characteristics including skin pigmentation and UV induced skin photoaging were also determined. In addition, demographic information along with phenotypic characteristics, sun exposure and sun protection practice history, and history of skin damage were assessed through a questionnaire. Results: Indoor workers typically received low doses of UV radiation. However, one driver received a high dose (13J/cm2 UVA and 4.99 MED UVB on the arm). Age and years residing in Australia had a positive correlation with UV induced skin pigmentation. The number of major sunburns before 18 years was a risk factor for skin damage in adults. Those participants with fair skin, non-black hair and blue/green /blue-grey eye were more likely to have skin damage related to sun exposure. Conclusions: A person’s age, years residing in Australia, numbers of major sunburn, skin colour, hair colour and eye colour are important factors associated with the development of sun-related skin damage in workers. ‘Real World’ implications: 1. The number of major sunburns before 18 years was a risk factor for skin damage in adults. This clearly confirms the importance of early prevention. To protect the skin from extensive sun exposure for your generation should have significance for further prevention of skin damage. 2. It is unsurprising that age and years residing in Australia were associated with skin damage related UV radiation. Therefore, the general public should reinforce their sun protective measures and check skin regularly. 3. Drivers should take sun protective measures during their working hours between sunrise and sunset.
Resumo:
Porous polylactide constructs were prepared by stereolithography, for the first time without the use of reactive diluents. Star-shaped poly(D,L-lactide) oligomers with 2, 3 and 6 arms were synthesised, end-functionalised with methacryloyl chloride and photocrosslinked in the presence of ethyl lactate as a non-reactive diluent. The molecular weights of the arms of the macromers were 0.2, 0.6, 1.1 and 5 kg/mol, allowing variation of the crosslink density of the resulting networks. Networks prepared from macromers of which the molecular weight per arm was 0.6 kg/mol or higher had good mechanical properties, similar to linear high molecular weight poly(D,L-lactide). A resin based on a 2-armed poly(D,L-lactide) macromer with a molecular weight of 0.6 kg/mol per arm (75 wt%), ethyl lactate (19 wt%), photo-initiator (6 wt%), inhibitor and dye was prepared. Using this resin, films and computer-designed porous constructs were accurately fabricated by stereolithography. Pre-osteoblasts showed good adherence to these photocrosslinked networks. The proliferation rate on these materials was comparable to that on high molecular weight poly(D,L-lactide) and tissue culture polystyrene.
Resumo:
Poly(D,L-lactide) is a degradable polymer with a long history of use in medical applications. It is strong and stiff and degrades over the course of months into lactic acid, a body-own substance. In the field of tissue engineering it is commonly used to fabricate scaffolds. Stereolithography is a high resolution rapid prototyping technique by which designed 3D objects can be built using photo-initiated radical polymerisations. Poly(D,Llactide) (PDLLA) networks can be obtained by photopolymerisation of oligomers functionalised with unsaturated groups. In this work, PDLLA oligomers of varying architectures (arm lengths, numbers of arms) were synthesised and end-functionalised with methacrylate groups. These macromers were photo-crosslinked in solution to yield PDLLA networks of different architectures. The influence of the network architecture on its physical properties was studied.
Resumo:
Changes in stride characteristics and gait rhythmicity characterize gait in Parkinson's disease and are widely believed to contribute to falls in this population. However, few studies have examined gait in PD patients who fall. This study reports on the complexities of walking in PD patients who reported falling during a 12-month follow-up. Forty-nine patients clinically diagnosed with idiopathic PD and 34 controls had their gait assessed using three-dimensional motion analysis. Of the PD patients, 32 (65%) reported at least one fall during the follow-up compared with 17 (50%) controls. The results showed that PD patients had increased stride timing variability, reduced arm swing and walked with a more stooped posture than controls. Additionally, PD fallers took shorter strides, walked slower, spent more time in double-support, had poorer gait stability ratios and did not project their center of mass as far forward of their base of support when compared with controls. These stride changes were accompanied by a reduced range of angular motion for the hip and knee joints. Relative to walking velocity, PD fallers had increased mediolateral head motion compared with PD nonfallers and controls. Therefore, head motion could exceed “normal” limits, if patients increased their walking speed to match healthy individuals. This could be a limiting factor for improving gait in PD and emphasizes the importance of clinically assessing gait to facilitate the early identification of PD patients with a higher risk of falling.
Resumo:
Shaft-mounted gearboxes are widely used in industry. The torque arm that holds the reactive torque on the housing of the gearbox, if properly positioned creates the reactive force that lifts the gearbox and unloads the bearings of the output shaft. The shortcoming of these torque arms is that if the gearbox is reversed the direction of the reactive force on the torque arm changes to opposite and added to the weight of the gearbox overloads the bearings shortening their operating life. In this paper, a new patented design of torque arms that develop a controlled lifting force and counteract the weight of the gearbox regardless of the direction of the output shaft rotation is described. Several mathematical models of the conventional and new torque arms were developed and verified experimentally on a specially built test rig that enables modelling of the radial compliance of the gearbox bearings and elastic elements of the torque arms. Comparison showed a good agreement between theoretical and experimental results.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.